Documente Academic
Documente Profesional
Documente Cultură
1.1 I can identify different types of connection methods that can be used to access the
Internet
Fill out the table below and put it into your weebly.
QUESTION
Wifi Hotspot
3g internet connection
It is connected to a real
hardwired provider e.g. BT
Give 1 disadvantage of
each internet connection
1.2 I can identify the benefits and drawbacks of the connection method used
Look at the table below and answer the questions underneath the table into your weebly
Vodafon
giffgaff
Three
EE
O2
Data allowance
Unlimited
5GB
7GB
20GB
5GB
No [1]
Yes
Yes
Yes
Yes
4G included [2]
Yes
Yes
No
Yes
No
Yes [3]
No
No
No
No
Tethering [4]
Yes
Yes
Yes
Yes
No
17.00
27.99
25.00
40.00
15.00
1. Look at the table above, which mobile contract is the best for internet.
Give 2 reasons why.three the data allowance is unlimited and it comes
cheaper then others wich have less data allowance and is 4g with no fair
use policy
2. Look at the table above, which mobile contract is the worst for internet.
Give 2 reasons why. ee it is expensive and there is no abroad data and it
only gives you 5gb
3. Give 1 advantage and 1 disadvantage of the traditional Dial up
connection. it is easy to connect to you don't need any passwords but
you are limited to a certain range
4. Give 1 advantage and 1 disadvantage of the latest broadband internet
connections they are fast and have big downloading and uploading
speeds but they are expensive
1.4 I can use help facilities to help solve internet connection problems
In your weebly:
QUESTION
Internet Explorer
Google Chrome
5. Give an example of a
plugin for each browser
Ad blocker pro
3. What actions can you take to make your browser run quicker? delete all history and cache
4. What security settings can you enable on your browser to keep safe online? You can
enable stop pop ups to stop pop ups and prevent certain sites from being opend
5. Name 1 Google Chrome extension that you use and why.ad blocker pro it block me from
seeing annoying ads
6. Why and when would you use the Ctrl + and Ctrl - keys in a browser? To zoom in or out
so you can see a image more clearly
7. What does it mean to go INCOGNITO on a browser, and why is it useful? When you
dont want anyone to see your history what you have been searching
2.3 I can adjust browser settings to optimise performance and meet needs
In your weebly write the following statement :
I have successfully passed 2.2, and as a result 2.3 is complete
Show a print screens of you being able to Clear the Cache and browsing History.
3.1 I can select and use appropriate search techniques to locate information
efficiently
Fill out the table below and put it into your weebly.
QUESTION
1. You need to find pictures of the
most recent queen of England.
Write down what you will be typing
in Google Search
Answer
the latest queen of england
QUESTION
Answer
http://www.lochness.co.uk/fan_club/
yes
http://www.nessie.co.uk/index.html
http://www.fanpop.com/clubs/loch-nessmonster
3.3 I can manage and use references to make it easier to find information another time
In your weebly:
Show a print screen of you using bookmarks in your Chrome browser whilst logged on, so
that the bookmarks exist whenever you log into google.
3.4 I can download, organise and store different types of information from the Internet
Write the following statement into your weebly
My assessor has seen me do this.
4.3 I can use browser tools to share information sources with others
Write the following statement into your weebly
I have successfully completed 3.3, and as a result this criteria has been completed too.
5.1 I can describe the threats to system performance when working online
Answer the following questions in your weebly
1. Describe what contention is and how it slows down your online experience? it overloads the
system so your online experienced is slowed down if you use it too mouch
2. Why would a virus checker slow down your online experience?its running in the back ground
slowing it down
3. How does malware slow down your system?it starts doing background task you dont want It
to do
5.2 I can work responsibly and take appropriate safety and security precautions when
working online
Answer the following questions in your weebly
1. What security risk could occur if you open up email attachments from people you dont
know? you could get unwanted viruses or malware
2. What security risk could occur if you post your picture on line and state what school you go
to? you could get a pedophile after you
3. Why is it better to sit up straight as opposed to slouching?so you have a better posture
5.3 I can describe the threats to information security when working online
Answer the following questions in your weebly
1. Why would a failed hard drive be a risk to your information it could lose all information stored
on it or not save properly
2. What is the best way to make sure your information is okay even if hardware fails? By
backing up information in sites like google drive
Using this website as a reference and in your own words, answer the following
questions in your weebly:
3. What is a cracker? Breaks into somones systems
4. What is a script kiddie? Someone who is a basic hacker and looks for scripts so they can
hack major things
5. What is a hacktivist? A cracker who hacks for a certain type of cause
5.5 I can describe the threats to user safety when working online
Answer the following questions in your weebly
1. In your own words, what is cyber stalking? Someone who has been following you or stalking
you online in a unwanted way
2. In your own words, give a real life example of someone who was cyber
stalked.
http://womensissues.about.com/od/violenceagainstwomen/a/CyberstalkStory.htmMy
heart was pounding, the way it does when you know you might be in trouble but
you don't want to admit it yet. Could it have something to do with my recent
change of address? I'd left an abusive relationship a few short weeks before. It
didn't occur to me to connect my problem to this escape. It must be a mistake. I
knew that I had money in my bank account, so whatever was happening with the
credit cards could be dealt with later.
3. What happened to the victim and the cyber stalker?the cyber stalker was charged and the
woman has increased the security of her accounts
3 Examples
Risk
1.email attachment
Viruses,malware,troj
an
2.pop ups
Show violent or
items not for the
underaged
Download ad blocker to
stop ads
3.malware
5.7 I can apply laws, guidelines and procedures for safe and secure Internet use
Answer the following questions in your weebly
1. In our school AUP, it states that you shouldnt publish email addresses on websites, why is
this? you could be spammed or cyber stalked
2. In our school AUP it states that we should not download attachments from emails where we
dont know the sender. Why is this? It could be a virus or malware thath steals information or
damages our computer
5.8 I can explain the importance of the relevant laws affecting Internet users.
Research the following topics(Copyright Law, Data Protection Act, Computer Misuse Act)
and answer the questions below into your weebly
Copyright Law
1. What is copyright law? It is used by artist and authors to stop people from stealing there
work
2. How does copyright law protect us? Its stops people from copying our work
3. What could happen if we broke the copyright law? Get fined and have jail time
4. Whats the best way to avoid breaking this law? See if your picture has been trademarked if
it has ask the user politley
Data Protection Act
5. What is the Data Protection Act? The government has set it to keep you protected
6. How does the Data protection Act protect us? No one else can access it other then us and
keep our processing protected
7. What could happen if we broke the Data Protection Act? You could be arrested and charged
8. Whats the best way to avoid breaking this law? Cheack the terms and conditions of what
you are using to make sure you are not breaking the law
Computer Misuse Act
1. What is the Computer Misuse Act? To protect your computer against wilfull
attacks by a anonymous threath
2. How does the Computer Misuse Act protect us? It keeps work private and
protected
3. What could happen if we broke the Computer Misuse Act? You can have 12
months to a whole decade in prison on top of a fine
4. Whats the best way to avoid breaking this law? Dont break into anyones
personal files